E-Mail In Peril - InformationWeek
07:15 PM

E-Mail In Peril

Ever-more-sophisticated e-mail attacks threaten to swamp this vital business tool. Can anyone throw us a lifeline?

E-mail as we know it is under duress. Ever-increasing loads of spam--estimated at up to 98% of all e-mail--is drowning out the messages business users need to see. Highly targeted phishing attacks are making news and leaving customers and employees jumpy. And for IT, concerns about sensitive data traveling the Internet unencrypted mean valuable e-mail business uses aren't even being considered.

We spoke with a variety of security vendors to see if there's any hope. Big trends include e-mail security in the cloud, led by Google's Postini; use of cryptographic signatures to thwart phishing; advances in encryption and key management; and merging of data leak prevention with mail systems.

InformationWeek Reports

One surprising finding is that the days of software-only e-mail security appear to be coming to an end. Even Sendmail, a descendant of the Internet's original Message Transfer Agent that has long been distributed as both open source and proprietary software, is now moving to an appliance model. Sendmail CEO Don Massaro ascribes this shift to simpler installation and integration as well as performance gains over software installed on commodity hardware and a stock operating system.

You don't just need to secure e-mail: IM is also proving a vector for data loss. We discuss how to stay safe.

Form factor isn't the only place we're seeing evolution. Last week's--or even yesterday's--spam-control techniques can't keep up with constantly increasing attacker sophistication (see Our Take: Any Spam is too Much). As in the security infrastructure, spam-control vendors are banking on multilayered defenses. Barracuda Networks' Spam Firewall filters messages through 11 layers, while Sendmail employs an "anti-spam cocktail," where many individual tests combine to give messages a "spamminess" score, says Greg Olsen, the company's director of product management.

In the past, a significant portion of the anti-spam arsenal involved blacklists and greylisting, but the efficacy of those tactics has decreased, forcing vendors to add new twists. Replacing, or at least augmenting, blacklists is the concept of reputation. Using their vast reach into the Internet mail stream, vendors track the IP addresses sending e-mail. Addresses known to send large amounts of valid mail don't need to be checked as thoroughly, but a node that suddenly starts spewing millions of messages would warrant suspicion. Where an older system might have used greylisting to simply delay delivery of all e-mail in the hopes the spammer wouldn't bother resending, today's systems selectively delay mail from nodes believed to be sending spam, or throttle the bandwidth available to those it's unsure about, until a decision is made.

Once a connection has been accepted, messages are individually scanned. The companies we spoke with perform extensive analysis, though not by trying to interpret a message's meaning, as in the past. While vendors are leery of sharing specifics, they all scrutinize thousands of attributes of a message and compare them against those found in millions of other messages to identify common elements in spam.

Impact Assessment: E-Mail Security

(click image for larger view)

1 of 4
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll